Listen

Description

Identity management is a critical aspect of any cybersecurity program. Creating the right roles and implementing a mature identity management lifecycle requires thoughtful collaboration between information technology and business operations. Tune in this week as Jen Stone (MCIS, CISSP, CISA, QSA) and Garret Grajek (CEH, CISSP, certified security engineer, product builder and CEO of YouAttest) sit to discuss:


Hosted by Jen Stone, Principal Security Analyst (MCIS, CISSP, CISA, QSA)

[Disclaimer] Before implementing any policies or procedures you hear about on this or any other episodes, make sure to talk to your legal department, IT department, and any other department assisting with your data security and compliance efforts.

Request a Quote for a PCI Audithttps://www.securitymetrics.com/pci-audit

Request a Quote for a Penetration Testhttps://www.securitymetrics.com/penetration-testing

Get the Guide to PCI DSS compliancehttps://www.securitymetrics.com/lp/pci/pci-guide

Get FREE security and compliance traininghttps://academy.securitymetrics.com/

Get in touch with SecurityMetrics' Sales Teamhttps://www.securitymetrics.com/contact/lets-get-you-to-the-right-place